A new YouTube phishing campaign is making rounds in the wild, urging users to read and accept so-called changes in YouTube’s rules and policies. What’s scary is that it abuses YouTube’s authentic email address to lure users into providing their credentials. What’s the new scam? YouTube has published a warning, stating …
Read More »Google: North Korea-Linked Hackers Target Subject Experts and Think Tanks
A North Korean government-backed hacking crew, tracked as ARCHIPELAGO, is targeting academics, government and military personnel, policymakers, researchers, and think tanks in South Korea and the U.S. According to Google researchers, it has launched cyberattacks against accounts belonging to individuals with expertise in North Korea policies such as sanctions, human rights, and …
Read More »Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days
Apple on Friday pushed out a major iOS security update to fix a pair of zero-day vulnerabilities already being exploited in the wild. The newest iOS 16.4.1 and iPadOS 16.4.1 updates cover code execution software flaws in IOSurfaceAccelerator and WebKit, suggesting a complex exploit chain was detected in the wild …
Read More »Apple fixes two zero-days exploited to hack iPhones and Macs
Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads. “Apple is aware of a report that this issue may have been actively exploited,” the company said when describing the issues in security advisories published on Friday. The first security flaw (tracked …
Read More »MSI confirms security breach following ransomware attack claims
Following reports of a ransomware attack, Taiwanese PC vendor MSI (short for Micro-Star International) confirmed today that its network was breached in a cyberattack. Earlier this week, the Money Message ransomware gang claimed to infiltrate some of MSI’s systems and stolen files that will be leaked online next week if the company refuses …
Read More »PAC orders inquiry into breach of army chief, family’s personal data
The parliament’s Public Accounts Committee has sought a criminal case against Nadra officers who allegedly breached the data and accessed personal information of the army chief’s family. The meeting on Thursday, chaired by MNA Noor Alam Khan, expressed serious concerns over media reports about the breach. Those involved in this …
Read More »MSI Confirms Breach as Ransomware Gang Claims Responsibility
A new statement(Opens in a new window) from MSI says users should avoid downloading firmware and BIOS updates from third-party sources, and instead only obtain such software from the company’s official website. The statement suggests MSI is worried hackers could circulate malicious versions of the company’s BIOS software when the ransomware gang, …
Read More »Asia-Pacific NGOs Lack Basic Cyber Controls, Finds Survey
Rising worries about the digital security of nongovernmental organizations in the Asia-Pacific region haven’t translated into robust adoption of basic measures, shows data from a survey of more than 1,500 regional NGOs. Infoxchange, an Australian IT consultant for social issue organizations, said only about 4 in 10 NGOs have enabled multifactor authentication …
Read More »Meeting the challenge of skill gaps in the age of digital transformation
The US is experiencing record unemployment rates, but despite the big-name layoffs in the headlines, the actual number of new jobs being created is outpacing these big org changes. This comes in large part from the number of companies, in every industry, turning toward digital transformation; which has in turn, …
Read More »A third of organizations admit to covering up data breaches
In a world where cybercrime is becoming more difficult to prevent, many security leaders are putting pressure on IT professionals to bury the truth. New research released by cybersecurity vendor Bitdefender today surveyed over 400 IT and security professionals who work in companies with 1,000 or more employees. Bitdefender found that 42% of IT …
Read More »